Preview

Ontological Approach

Good Essays
Open Document
Open Document
465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ontological Approach
Ontological approach provides us with the way to store the information that can be gained from the attack graph in a structured form. Ontology is made of entities and their interrelationships. The entities are defined as follows:Machine: Any host machine connected to the network comes in the category. All the workstations and the servers that the attacker can use to his advantage will be called as a machine. Vulnerability: Any weakness in the system that the attacker have access and capability to exploit is considered a vulnerability. There are many vulnerability scanners available that scan the system and list all the vulnerabilities that exist in that particular system. All the vulnerabilities are …show more content…
The labeling of vulnerability goes like this LOW: if the base score is 0.0-3.9,MEDIUM if the base score is 4.0-6.9, HIGH if the base score is 7.0-8.9 and CRITICAL if the base score is 9.0-10.0.Vulnerability Description: National Vulnerability Database provides vulnerability description along with the vulnerability ids and the CVSS score. Vulnerability description gives details of what type of attack can exploit that vulnerability.Attack: An attack can be defined as an unwanted situation when the attacker exploits the vulnerability present in the system and gains certain advantage out of it.Attacker: Attacker is someone who initiates the attack.Privileges: After every attack, the attacker as a consequence gains some advantage out of the attack. These advantages come under the privileges gained by the attacker.Attack Description: Description of particular attack that is how it is carried is given under this entity.Goal: Every attacker has a goal which he wants to achieve.To achieve that particular goal he launches a series of attacks.This goal is specified under this category.Paths: An attacker can follow various different paths to achieve a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The time between each of these areas or, the vulnerability’s lifecycle is divided into three risk areas. These areas are listed below and explained briefly.…

    • 350 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    Vulnerabilities and Threats - any weakness in a system that makes it possible for a threat to cause harm.…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerabilities and exploits are identified by enumeration, which is the most aggressive of the scanning stage.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Vulnerability Mapping and Penetration – Any computers or devices that are found will be scanned for vulnerabilities using a wide variety of tools and techniques. The tools and techniques used will be consistent with current industry trends regarding exploitation of vulnerabilities. Malcolm Testing Solutions will attempt to find the a weak link within the network that can be exploited to penetrate the network up to…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT…

    • 626 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. Refers to scanning a system for vulnerabilities and reveals information about the target that is needed to access it.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (“Common Cybersecurity,” 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting…

    • 3199 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    operating system

    • 464 Words
    • 2 Pages

    CVE listing is a dictionary of publicly known information security vulnerabilities and exposures. IT is hosted by the Office of Cybersecurity and Communications at the U.S. Department of Homeland Security…

    • 464 Words
    • 2 Pages
    Good Essays
  • Good Essays

    In this article, the authors explain about the evolution of the constructivist grounded theory by tracing the historical development of the methodology. It is a popular methodology in psychology, education and nursing. The authors also demonstrate the difference between traditional and constructivist grounded theory through discussing their common characteristics. Such a comprehensive discussion broadens my theoretical knowledge and makes me confident to apply this methodology efficiently. Being a professor of nursing, Mills focuses her research on primary health care, rural health workforce and health service strengthening, and nursing education. Therefore, Mills and her colleagues refer to many nursing publications in this article. The ontological…

    • 607 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    * Prioritize classified risks, threats, and vulnerabilities according to the defined qualitative risk assessment scale…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Concept Analysis

    • 1748 Words
    • 7 Pages

    The concept health is referred to as the ability to function independently; adapt to life's stressors; achievement of one's full potential and unity of mind, body and soul. Jean Watson identified health as one of many concepts used to understand the theory or science of human caring (McEwen & Wills, 2011).…

    • 1748 Words
    • 7 Pages
    Powerful Essays